Home Working Creates More Cyber Attacks

A remote workforce comes with  numerous risks, with employees relying on their home networks and sometimes their own devices, to complete tasks. In many cases they will lack the skills to deal with even simple technical issues and will be dependent up remote IT support.

According to Velocity-Smart Technology’s recent research 70% of remote workers said they had experienced IT problems during the pandemic, and 54% had to wait up to three hours for the issue to be resolved.

Remote employees may be unknowingly putting your company's data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences.

REvil, a cyber criminal hacking group, chose US Independence Day, 4 July for a number of cyber attacks knowing that many IT and cyber security teams would be on holiday. Over a 1,000 companies in the US, and at least 17 other countries were hacked.  Among those hacked was a well-known software provider, Kaseya.  REvil used Kaseya as a conduit to spread its ransomware through other corporate and cloud-based networks that use the software.

REvil subsequently claimed responsibility for the incident and claimed to have encrypted more than one million systems. The group then demanded a ransom of $70m (£50.5m) in Bitcoin for the release of a universal decryption tool that would allow those affected to recover their crucial files.

Hacking experts warn that such attacks are likely to become more frequent, and suggest businesses cannot afford to underestimate the hidden impact the pandemic has had on their vulnerability. A recent survey from the leading security firm, Tessian, found that 56% of senior IT technicians believe their employees have picked up bad cyber-security habits while working from home. Furthermore, the survey found that many employees agreed with that assessment. 

  • Nearly two in five (39%) admitted that their cyber-security practices at home were less thorough than those practiced in the office, with half admitting that this is a result of feeling less scrutinised by their IT departments now, than prior to Covid. 

Experts also warn of a significant growth in the number of coronavirus-themed phishing emails targeting employees, being reported by several companies around the world. Attacks are rising not only because of remote working but as criminals become more organised and ransomware attacks become easier to execute.

The only reason ransomware remains lucrative is because victims pay the ransom, opting to do so because they think it is as the best way to restore the network. But paying the ransom means attacks will just continue. Employers, management and employees need to act quickly to plug potential security threats to ensure their businesses continues to operate safely and avoids any hack that may affect themselves and their clients.

Velocity-Smart:       IT Governance:      Forbes:      SOSCanHelp:         Digiday:     

ZDNet:      Guardian:       BBC

You Might Also Read:

Will Governments Ban Ransom Payments To Hackers?:

 

« New Tools Optimise Use Of Existing Data
Nexperia - A Bigger Threat Than Huawei? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

DDLS

DDLS

DDLS is Australia's largest provider of corporate IT, process training and cybersecurity training courses and certification programs.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.